CN114299641B - Door control noninductive unlocking method and system - Google Patents

Door control noninductive unlocking method and system Download PDF

Info

Publication number
CN114299641B
CN114299641B CN202111422844.1A CN202111422844A CN114299641B CN 114299641 B CN114299641 B CN 114299641B CN 202111422844 A CN202111422844 A CN 202111422844A CN 114299641 B CN114299641 B CN 114299641B
Authority
CN
China
Prior art keywords
thread
bluetooth
verification
access control
mac address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111422844.1A
Other languages
Chinese (zh)
Other versions
CN114299641A (en
Inventor
吴太亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Newland Communication Science Technologies Co ltd
Original Assignee
Fujian Newland Communication Science Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Newland Communication Science Technologies Co ltd filed Critical Fujian Newland Communication Science Technologies Co ltd
Priority to CN202111422844.1A priority Critical patent/CN114299641B/en
Publication of CN114299641A publication Critical patent/CN114299641A/en
Application granted granted Critical
Publication of CN114299641B publication Critical patent/CN114299641B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention provides a door control noninductive unlocking method and a door control noninductive unlocking system in the technical field of intelligent door control, wherein the method comprises the following steps: s10, creating a thread A, a thread B, a thread C and a thread D which are mutually independent through entrance guard, and presetting a signal intensity threshold; step S20, the access control acquires authorization equipment information from a server through a thread C; step S30, after the entrance guard monitors the induction signal of the infrared sensor through the thread D, searching nearby Bluetooth devices through the thread A, and acquiring Bluetooth mac addresses of the Bluetooth devices; and S40, the access control calls authorization equipment information through the thread B to perform first verification on the Bluetooth mac address, and then performs second verification on the Bluetooth equipment through the signal intensity threshold value to complete non-inductive unlocking of the access control. The invention has the advantages that: the noninductive unlocking of the door control is realized, and the user experience is greatly improved.

Description

Door control noninductive unlocking method and system
Technical Field
The invention relates to the technical field of intelligent access control, in particular to a non-inductive unlocking method and system for access control.
Background
The entrance guard is a new safety management system, integrates microcomputer automatic identification technology and modern safety management measures, relates to a plurality of new technologies such as electronics, machinery, optics, computer technology, communication technology, biotechnology and the like, and is an effective measure for realizing safety precaution management of the entrance of important places.
At present, many access control systems do not support face recognition, two-dimensional codes are required to be presented through a mobile phone or an IC card is required to unlock and open the door, however, the unlocking experience is not friendly; the two-dimensional code is required to be shown out of the mobile phone to find the corresponding app and then the two-dimensional code interface is opened, or the two-dimensional code interface is jumped into the remote door opening interface through the sweeping interface to operate, and the IC card is required to be additionally carried every day when the two-dimensional code is unlocked through the IC card, so that the risk of losing exists, and a lot of troubles are added to the unlocking of the entrance guard.
Therefore, how to provide a method and a system for unlocking the door control without sense, so as to realize the unlocking of the door control without sense, so as to improve the user experience, and the method and the system become a technical problem to be solved urgently.
Disclosure of Invention
The invention aims to solve the technical problem of providing a door control noninductive unlocking method and a door control noninductive unlocking system, which can realize the noninductive unlocking of the door control so as to improve the user experience.
In a first aspect, the invention provides a door control noninductive unlocking method, which comprises the following steps:
s10, creating a thread A, a thread B, a thread C and a thread D which are mutually independent through entrance guard, and presetting a signal intensity threshold;
step S20, the access control acquires authorization equipment information from a server through a thread C;
step S30, after the entrance guard monitors the induction signal of the infrared sensor through the thread D, searching nearby Bluetooth devices through the thread A, and acquiring Bluetooth mac addresses of the Bluetooth devices;
and S40, the access control calls authorization equipment information through the thread B to perform first verification on the Bluetooth mac address, and then performs second verification on the Bluetooth equipment through the signal intensity threshold value to complete non-inductive unlocking of the access control.
Further, in the step S10, the thread a is configured to invoke a bluetooth function of the access control to search for nearby bluetooth devices; the thread B is used for verifying the authority of the Bluetooth equipment; the thread C is used for subscribing the mqtt message from the server; the thread D is used for monitoring the sensing signal of the infrared sensor of the access control.
Further, the step S20 specifically includes:
s21, the Bluetooth equipment logs in a server through an mqtt protocol, and reports a Bluetooth mac address and authorized personnel information; the Bluetooth equipment at least comprises a mobile phone, a tablet personal computer, a smart watch and a smart bracelet;
step S22, the server receives the Bluetooth mac address and the authorized personnel information and binds and records the Bluetooth mac address and the authorized personnel information into the authorized equipment information;
and S23, subscribing the mqtt message from the server by the access control through the thread C, and further acquiring the information of the authorization equipment.
Further, the step S30 specifically includes:
step S31, monitoring whether a person approaches or not in real time by an infrared sensor, triggering a sensing signal after the infrared sensor monitors that the person approaches, monitoring interrupt reply by the thread D, and sending a search instruction to the thread A;
step S32, the thread A searches nearby Bluetooth devices based on the received search instruction, obtains Bluetooth mac addresses of the Bluetooth devices, and sends the Bluetooth mac addresses to the thread B.
Further, the step S40 specifically includes:
step S41, the access control calls authorization equipment information through the thread B to sequentially perform first verification on each Bluetooth mac address, whether the authorization equipment information has a matched Bluetooth mac address or not is judged, if yes, the first verification is passed, and step S42 is entered; if not, the first verification is not passed, and the next Bluetooth mac address is subjected to the first verification or the flow is ended;
step S42, judging whether the signal intensity of the Bluetooth mac addresses passing the first verification is larger than a signal intensity threshold value or not according to the thread B, if so, passing the second verification, and performing non-inductive unlocking of the access control; if not, the signal intensity of the next Bluetooth device is subjected to second verification or the process is ended.
In a second aspect, the invention provides an access control non-inductive unlocking system, which comprises the following modules:
the access control initialization module is used for creating a thread A, a thread B, a thread C and a thread D which are mutually independent in access control, and presetting a signal intensity threshold;
the authorization equipment information acquisition module is used for acquiring authorization equipment information from the server through the thread C by the access control;
the Bluetooth mac address acquisition module is used for searching nearby Bluetooth devices through the thread A after the entrance guard monitors the induction signals of the infrared sensor through the thread D, and acquiring Bluetooth mac addresses of the Bluetooth devices;
and the permission verification module is used for performing first verification on the Bluetooth mac address by calling the authorization equipment information through the thread B, and performing second verification on the Bluetooth equipment through the signal intensity threshold value to complete the noninductive unlocking of the access control.
Further, in the access control initialization module, the thread a is used for calling a bluetooth function of the access control to search nearby bluetooth devices; the thread B is used for verifying the authority of the Bluetooth equipment; the thread C is used for subscribing the mqtt message from the server; the thread D is used for monitoring the sensing signal of the infrared sensor of the access control.
Further, the authorization device information acquisition module specifically includes:
the Bluetooth equipment connection unit is used for the Bluetooth equipment to log in the server through the mqtt protocol and report the Bluetooth mac address and the authorized personnel information; the Bluetooth equipment at least comprises a mobile phone, a tablet personal computer, a smart watch and a smart bracelet;
the authorization equipment information updating unit is used for receiving the Bluetooth mac address and the authorization personnel information by the server and binding and recording the Bluetooth mac address and the authorization personnel information into the authorization equipment information;
and the authorization equipment information issuing unit is used for subscribing the mqtt message from the server through the thread C by the access control, so as to acquire the authorization equipment information.
Further, the bluetooth mac address acquisition module specifically includes:
the infrared monitoring unit is used for monitoring whether a person approaches or not in real time through the infrared sensor, triggering the sensing signal after the infrared sensor monitors that the person approaches, monitoring interrupt reply by the thread D, and sending a search instruction to the thread A;
the Bluetooth searching unit is used for searching nearby Bluetooth devices based on the received searching instruction by the thread A, acquiring Bluetooth mac addresses of the Bluetooth devices, and sending the Bluetooth mac addresses to the thread B.
Further, the permission verification module specifically includes:
the first verification unit is used for sequentially carrying out first verification on each Bluetooth mac address by calling the authorization equipment information through the thread B, judging whether the authorization equipment information has a matched Bluetooth mac address, if so, passing the first verification, and entering the second verification unit; if not, the first verification is not passed, and the next Bluetooth mac address is subjected to the first verification or the flow is ended;
the second verification unit is used for judging whether the signal intensity of the Bluetooth equipment corresponding to each Bluetooth mac address passing through the first verification is larger than a signal intensity threshold value or not through the thread B, if yes, the second verification passes, and the non-inductive unlocking of the access control is carried out; if not, the signal intensity of the next Bluetooth device is subjected to second verification or the process is ended.
The invention has the advantages that:
1. through in the authorization equipment information with bluetooth mac address and the authorized personnel information update to the server of bluetooth equipment in advance, the access control obtains authorized equipment information through the server, after the access control senses someone through infrared sensor, start bluetooth search nearby bluetooth equipment, and carry out first verification to bluetooth mac address of bluetooth equipment through authorized equipment information, the rethread signal strength threshold value carries out the second verification to bluetooth equipment's signal strength, verify and pass through the unblock that carries out the access promptly, the unblock process need not the user to show any equipment and article, only need be close to can the automatic unblock, finally realize the noninductive unblock of access control, very big promotion user experience.
2. The communication is carried out through the mqtt protocol, one-to-many message release is provided, the server can conveniently send authorized equipment information to a plurality of access control devices, the cost is low, and the use of network traffic is greatly reduced.
3. By creating mutually independent threads A, B, C and D, the method is used for calling Bluetooth functions of an access control to search nearby Bluetooth equipment, verifying authority of the Bluetooth equipment, subscribing mqtt information to a server and monitoring induction signals of an infrared sensor of the access control, interference among threads is avoided, and stability of unlocking of the access control is greatly improved.
Drawings
The invention will be further described with reference to examples of embodiments with reference to the accompanying drawings.
Fig. 1 is a flowchart of an access control non-inductive unlocking method of the invention.
Fig. 2 is a schematic structural diagram of an access control non-inductive unlocking system.
Fig. 3 is a hardware architecture diagram of the present invention.
Detailed Description
According to the technical scheme in the embodiment of the application, the overall thought is as follows: after the entrance guard senses someone through the infrared sensor, bluetooth equipment nearby bluetooth searching is started, bluetooth mac addresses of the bluetooth equipment are verified first through authorization equipment information acquired from the server, signal intensity of the bluetooth equipment is verified second through the signal intensity threshold, unlocking of the entrance guard is verified through, no equipment or articles are required to be shown by a user in the unlocking process, and noninductive unlocking of the entrance guard is achieved through combination of bluetooth and infrared technology.
Referring to fig. 1 to 3, a preferred embodiment of a door lock non-sensing unlocking method of the present invention includes the following steps:
s10, creating a thread A, a thread B, a thread C and a thread D which are mutually independent through entrance guard, and presetting a signal intensity threshold; the independent threads are created, so that interference among the threads can be avoided, and the stability of door control unlocking is improved; the signal intensity threshold is used for verifying the signal intensity of the Bluetooth equipment, namely the signal intensity is not up to the standard and can not be unlocked;
step S20, the access control acquires authorization equipment information from a server through a thread C;
step S30, after the entrance guard monitors the induction signal of the infrared sensor through the thread D, searching nearby Bluetooth devices through the thread A, and acquiring Bluetooth mac addresses of the Bluetooth devices; when searching for nearby bluetooth devices, a list of all nearby bluetooth devices is listed, so that further verification is needed to judge which bluetooth device has unlocking authority;
and S40, the access control calls authorization equipment information through the thread B to perform first verification on the Bluetooth mac address, and then performs second verification on the Bluetooth equipment through the signal intensity threshold value to complete non-inductive unlocking of the access control.
That is, after the infrared sensor senses someone, the Bluetooth equipment near the entrance guard is scanned, the Bluetooth mac address and the signal intensity of the Bluetooth equipment are sequentially verified, the entrance guard is unlocked after verification, a user does not need to show any equipment or articles, and non-inductive unlocking is performed.
In the step S10, the thread a is configured to invoke a bluetooth function of the access control to search for nearby bluetooth devices; the thread B is used for verifying the authority of the Bluetooth equipment; the thread C is used for subscribing the mqtt message from the server; the thread D is used for monitoring the sensing signal of the infrared sensor of the access control.
The step S20 specifically includes:
s21, the Bluetooth equipment logs in a server through an mqtt protocol, and reports a Bluetooth mac address and authorized personnel information; the Bluetooth equipment at least comprises a mobile phone, a tablet personal computer, a smart watch and a smart bracelet;
step S22, the server receives the Bluetooth mac address and the authorized personnel information and binds and records the Bluetooth mac address and the authorized personnel information into the authorized equipment information;
and S23, subscribing the mqtt message from the server by the access control through the thread C, and further acquiring the information of the authorization equipment. The mqtt protocol provides one-to-many message release, which is convenient for the server to send the authorized equipment information to a plurality of access control devices, and has low cost and greatly reduces the use of network traffic.
The step S30 specifically includes:
step S31, monitoring whether a person approaches or not in real time by an infrared sensor, triggering a sensing signal after the infrared sensor monitors that the person approaches, monitoring interrupt reply by the thread D, and sending a search instruction to the thread A;
step S32, the thread A searches nearby Bluetooth devices based on the received search instruction, obtains Bluetooth mac addresses of the Bluetooth devices, and sends the Bluetooth mac addresses to the thread B.
The step S40 specifically includes:
step S41, the access control calls authorization equipment information through the thread B to sequentially perform first verification on each Bluetooth mac address, whether the authorization equipment information has a matched Bluetooth mac address or not is judged, if yes, the first verification is passed, and step S42 is entered; if not, the first verification is not passed, and the next Bluetooth mac address is subjected to the first verification or the flow is ended;
step S42, judging whether the signal intensity of the Bluetooth mac addresses passing the first verification is larger than a signal intensity threshold value or not according to the thread B, if so, passing the second verification, and performing non-inductive unlocking of the access control; if not, the signal intensity of the next Bluetooth device is subjected to second verification or the process is ended. Through carrying out dual verification to bluetooth mac address and signal strength, ensured the security of entrance guard unblock.
The invention relates to a preferred embodiment of a door control noninductive unlocking system, which comprises the following modules:
the access control initialization module is used for creating a thread A, a thread B, a thread C and a thread D which are mutually independent in access control, and presetting a signal intensity threshold; the independent threads are created, so that interference among the threads can be avoided, and the stability of door control unlocking is improved; the signal intensity threshold is used for verifying the signal intensity of the Bluetooth equipment, namely the signal intensity is not up to the standard and can not be unlocked;
the authorization equipment information acquisition module is used for acquiring authorization equipment information from the server through the thread C by the access control;
the Bluetooth mac address acquisition module is used for searching nearby Bluetooth devices through the thread A after the entrance guard monitors the induction signals of the infrared sensor through the thread D, and acquiring Bluetooth mac addresses of the Bluetooth devices; when searching for nearby bluetooth devices, a list of all nearby bluetooth devices is listed, so that further verification is needed to judge which bluetooth device has unlocking authority;
and the permission verification module is used for performing first verification on the Bluetooth mac address by calling the authorization equipment information through the thread B, and performing second verification on the Bluetooth equipment through the signal intensity threshold value to complete the noninductive unlocking of the access control.
That is, after the infrared sensor senses someone, the Bluetooth equipment near the entrance guard is scanned, the Bluetooth mac address and the signal intensity of the Bluetooth equipment are sequentially verified, the entrance guard is unlocked after verification, a user does not need to show any equipment or articles, and non-inductive unlocking is performed.
In the entrance guard initialization module, the thread A is used for calling the Bluetooth function of the entrance guard to search nearby Bluetooth equipment; the thread B is used for verifying the authority of the Bluetooth equipment; the thread C is used for subscribing the mqtt message from the server; the thread D is used for monitoring the sensing signal of the infrared sensor of the access control.
The authorization equipment information acquisition module specifically comprises:
the Bluetooth equipment connection unit is used for the Bluetooth equipment to log in the server through the mqtt protocol and report the Bluetooth mac address and the authorized personnel information; the Bluetooth equipment at least comprises a mobile phone, a tablet personal computer, a smart watch and a smart bracelet;
the authorization equipment information updating unit is used for receiving the Bluetooth mac address and the authorization personnel information by the server and binding and recording the Bluetooth mac address and the authorization personnel information into the authorization equipment information;
and the authorization equipment information issuing unit is used for subscribing the mqtt message from the server through the thread C by the access control, so as to acquire the authorization equipment information. The mqtt protocol provides one-to-many message release, which is convenient for the server to send the authorized equipment information to a plurality of access control devices, and has low cost and greatly reduces the use of network traffic.
The Bluetooth mac address acquisition module specifically comprises:
the infrared monitoring unit is used for monitoring whether a person approaches or not in real time through the infrared sensor, triggering the sensing signal after the infrared sensor monitors that the person approaches, monitoring interrupt reply by the thread D, and sending a search instruction to the thread A;
the Bluetooth searching unit is used for searching nearby Bluetooth devices based on the received searching instruction by the thread A, acquiring Bluetooth mac addresses of the Bluetooth devices, and sending the Bluetooth mac addresses to the thread B.
The permission verification module specifically comprises:
the first verification unit is used for sequentially carrying out first verification on each Bluetooth mac address by calling the authorization equipment information through the thread B, judging whether the authorization equipment information has a matched Bluetooth mac address, if so, passing the first verification, and entering the second verification unit; if not, the first verification is not passed, and the next Bluetooth mac address is subjected to the first verification or the flow is ended;
the second verification unit is used for judging whether the signal intensity of the Bluetooth equipment corresponding to each Bluetooth mac address passing through the first verification is larger than a signal intensity threshold value or not through the thread B, if yes, the second verification passes, and the non-inductive unlocking of the access control is carried out; if not, the signal intensity of the next Bluetooth device is subjected to second verification or the process is ended. Through carrying out dual verification to bluetooth mac address and signal strength, ensured the security of entrance guard unblock.
In summary, the invention has the advantages that:
1. through in the authorization equipment information with bluetooth mac address and the authorized personnel information update to the server of bluetooth equipment in advance, the access control obtains authorized equipment information through the server, after the access control senses someone through infrared sensor, start bluetooth search nearby bluetooth equipment, and carry out first verification to bluetooth mac address of bluetooth equipment through authorized equipment information, the rethread signal strength threshold value carries out the second verification to bluetooth equipment's signal strength, verify and pass through the unblock that carries out the access promptly, the unblock process need not the user to show any equipment and article, only need be close to can the automatic unblock, finally realize the noninductive unblock of access control, very big promotion user experience.
2. The communication is carried out through the mqtt protocol, one-to-many message release is provided, the server can conveniently send authorized equipment information to a plurality of access control devices, the cost is low, and the use of network traffic is greatly reduced.
3. By creating mutually independent threads A, B, C and D, the method is used for calling Bluetooth functions of an access control to search nearby Bluetooth equipment, verifying authority of the Bluetooth equipment, subscribing mqtt information to a server and monitoring induction signals of an infrared sensor of the access control, interference among threads is avoided, and stability of unlocking of the access control is greatly improved.
While specific embodiments of the invention have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the invention, and that equivalent modifications and variations of the invention in light of the spirit of the invention will be covered by the claims of the present invention.

Claims (2)

1. A door control noninductive unlocking method is characterized in that: the method comprises the following steps:
s10, creating a thread A, a thread B, a thread C and a thread D which are mutually independent through entrance guard, and presetting a signal intensity threshold;
the thread A is used for calling the Bluetooth function of the access control to search nearby Bluetooth equipment; the thread B is used for verifying the authority of the Bluetooth equipment; the thread C is used for subscribing the mqtt message from the server; the thread D is used for monitoring the induction signal of the infrared sensor of the access control; the signal strength threshold is used for verifying the signal strength of the Bluetooth equipment;
step S20, the access control acquires authorization equipment information from a server through a thread C;
step S30, after the entrance guard monitors the induction signal of the infrared sensor through the thread D, searching nearby Bluetooth devices through the thread A, and acquiring Bluetooth mac addresses of the Bluetooth devices;
step S40, the entrance guard calls authorization equipment information through the thread B to perform first verification on the Bluetooth mac address, and then performs second verification on the Bluetooth equipment through the signal intensity threshold value to complete non-inductive unlocking of the entrance guard;
the step S20 specifically includes:
s21, the Bluetooth equipment logs in a server through an mqtt protocol, and reports a Bluetooth mac address and authorized personnel information; the Bluetooth equipment at least comprises a mobile phone, a tablet personal computer, a smart watch and a smart bracelet;
step S22, the server receives the Bluetooth mac address and the authorized personnel information and binds and records the Bluetooth mac address and the authorized personnel information into the authorized equipment information;
s23, subscribing an mqtt message to a server by an access control through a thread C, and further acquiring the information of the authorization equipment;
the step S30 specifically includes:
step S31, monitoring whether a person approaches or not in real time by an infrared sensor, triggering a sensing signal after the infrared sensor monitors that the person approaches, monitoring interrupt reply by the thread D, and sending a search instruction to the thread A;
step S32, the thread A searches nearby Bluetooth devices based on the received search instruction, obtains Bluetooth mac addresses of the Bluetooth devices, and sends the Bluetooth mac addresses to the thread B;
the step S40 specifically includes:
step S41, the access control calls authorization equipment information through the thread B to sequentially perform first verification on each Bluetooth mac address, whether the authorization equipment information has a matched Bluetooth mac address or not is judged, if yes, the first verification is passed, and step S42 is entered; if not, the first verification is not passed, and the next Bluetooth mac address is subjected to the first verification or the flow is ended;
step S42, judging whether the signal intensity of the Bluetooth mac addresses passing the first verification is larger than a signal intensity threshold value or not according to the thread B, if so, passing the second verification, and performing non-inductive unlocking of the access control; if not, the signal intensity of the next Bluetooth device is subjected to second verification or the process is ended.
2. An access control noninductive unlocking system is characterized in that: the device comprises the following modules:
the access control initialization module is used for creating a thread A, a thread B, a thread C and a thread D which are mutually independent in access control, and presetting a signal intensity threshold;
the thread A is used for calling the Bluetooth function of the access control to search nearby Bluetooth equipment; the thread B is used for verifying the authority of the Bluetooth equipment; the thread C is used for subscribing the mqtt message from the server; the thread D is used for monitoring the induction signal of the infrared sensor of the access control; the signal strength threshold is used for verifying the signal strength of the Bluetooth equipment;
the authorization equipment information acquisition module is used for acquiring authorization equipment information from the server through the thread C by the access control;
the Bluetooth mac address acquisition module is used for searching nearby Bluetooth devices through the thread A after the entrance guard monitors the induction signals of the infrared sensor through the thread D, and acquiring Bluetooth mac addresses of the Bluetooth devices;
the permission verification module is used for performing first verification on the Bluetooth mac address by calling the authorization equipment information through the thread B, and performing second verification on the Bluetooth equipment through the signal intensity threshold value to finish the noninductive unlocking of the access control;
the authorization equipment information acquisition module specifically comprises:
the Bluetooth equipment connection unit is used for the Bluetooth equipment to log in the server through the mqtt protocol and report the Bluetooth mac address and the authorized personnel information; the Bluetooth equipment at least comprises a mobile phone, a tablet personal computer, a smart watch and a smart bracelet;
the authorization equipment information updating unit is used for receiving the Bluetooth mac address and the authorization personnel information by the server and binding and recording the Bluetooth mac address and the authorization personnel information into the authorization equipment information;
the authorization equipment information issuing unit is used for subscribing the mqtt message from the server through the thread C by the access control, so as to acquire the authorization equipment information;
the Bluetooth mac address acquisition module specifically comprises:
the infrared monitoring unit is used for monitoring whether a person approaches or not in real time through the infrared sensor, triggering the sensing signal after the infrared sensor monitors that the person approaches, monitoring interrupt reply by the thread D, and sending a search instruction to the thread A;
the Bluetooth searching unit is used for searching nearby Bluetooth devices by the thread A based on the received searching instruction, acquiring Bluetooth mac addresses of the Bluetooth devices and sending the Bluetooth mac addresses to the thread B;
the permission verification module specifically comprises:
the first verification unit is used for sequentially carrying out first verification on each Bluetooth mac address by calling the authorization equipment information through the thread B, judging whether the authorization equipment information has a matched Bluetooth mac address, if so, passing the first verification, and entering the second verification unit; if not, the first verification is not passed, and the next Bluetooth mac address is subjected to the first verification or the flow is ended;
the second verification unit is used for judging whether the signal intensity of the Bluetooth equipment corresponding to each Bluetooth mac address passing through the first verification is larger than a signal intensity threshold value or not through the thread B, if yes, the second verification passes, and the non-inductive unlocking of the access control is carried out; if not, the signal intensity of the next Bluetooth device is subjected to second verification or the process is ended.
CN202111422844.1A 2021-11-26 2021-11-26 Door control noninductive unlocking method and system Active CN114299641B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111422844.1A CN114299641B (en) 2021-11-26 2021-11-26 Door control noninductive unlocking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111422844.1A CN114299641B (en) 2021-11-26 2021-11-26 Door control noninductive unlocking method and system

Publications (2)

Publication Number Publication Date
CN114299641A CN114299641A (en) 2022-04-08
CN114299641B true CN114299641B (en) 2023-12-22

Family

ID=80964784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111422844.1A Active CN114299641B (en) 2021-11-26 2021-11-26 Door control noninductive unlocking method and system

Country Status (1)

Country Link
CN (1) CN114299641B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833808A (en) * 2010-05-20 2010-09-15 上海洪剑智能科技有限公司 Face identification access control system capable of realizing multipath control and identification method thereof
CN105118128A (en) * 2015-09-18 2015-12-02 广东工业大学 Bluetooth entrance guard system and Bluetooth entrance guard method thereof
CN105488874A (en) * 2015-11-20 2016-04-13 北京天诚盛业科技有限公司 Biological recognition method and apparatus based on multi-thread control
CN105631987A (en) * 2015-02-12 2016-06-01 北京神器科技有限公司 Bluetooth access control unlocking method, device and system
CN105976639A (en) * 2016-07-08 2016-09-28 南京物联传感技术有限公司 Intelligent parking place lock system based on wireless communication module, and application thereof
GB201616373D0 (en) * 2016-09-27 2016-11-09 Zoneart Networks Ltd Wireless access control system
CN106204817A (en) * 2016-06-24 2016-12-07 福建求实智能股份有限公司 A kind of control method of control of bluetooth access
CN106973079A (en) * 2017-02-13 2017-07-21 长沙业鑫通讯技术有限公司 A kind of access control method based on MQTT
CN107786645A (en) * 2017-10-12 2018-03-09 重庆云停智连科技有限公司 A kind of noninductive yardwork method based on NB iot communications
CN110738776A (en) * 2019-10-22 2020-01-31 飞天诚信科技股份有限公司 method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833808A (en) * 2010-05-20 2010-09-15 上海洪剑智能科技有限公司 Face identification access control system capable of realizing multipath control and identification method thereof
CN105631987A (en) * 2015-02-12 2016-06-01 北京神器科技有限公司 Bluetooth access control unlocking method, device and system
CN105118128A (en) * 2015-09-18 2015-12-02 广东工业大学 Bluetooth entrance guard system and Bluetooth entrance guard method thereof
CN105488874A (en) * 2015-11-20 2016-04-13 北京天诚盛业科技有限公司 Biological recognition method and apparatus based on multi-thread control
CN106204817A (en) * 2016-06-24 2016-12-07 福建求实智能股份有限公司 A kind of control method of control of bluetooth access
CN105976639A (en) * 2016-07-08 2016-09-28 南京物联传感技术有限公司 Intelligent parking place lock system based on wireless communication module, and application thereof
GB201616373D0 (en) * 2016-09-27 2016-11-09 Zoneart Networks Ltd Wireless access control system
CN106973079A (en) * 2017-02-13 2017-07-21 长沙业鑫通讯技术有限公司 A kind of access control method based on MQTT
CN107786645A (en) * 2017-10-12 2018-03-09 重庆云停智连科技有限公司 A kind of noninductive yardwork method based on NB iot communications
CN110738776A (en) * 2019-10-22 2020-01-31 飞天诚信科技股份有限公司 method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof

Also Published As

Publication number Publication date
CN114299641A (en) 2022-04-08

Similar Documents

Publication Publication Date Title
CA2924381C (en) Access control using portable electronic devices
EP2192560B1 (en) Access control
CN204256490U (en) A kind of intelligentized community security system
US20060090079A1 (en) Voice authenticated alarm exit and entry interface system
AU2016348413A1 (en) Systems and methods for controlling access to physical space
CN105378648A (en) Self-provisioning access control
KR101570463B1 (en) Portable terminals and door locks are interlocked
CN104967825A (en) Gatekeeper electronic dog system
CN110517384B (en) Key management box
CN110796776A (en) Intelligent access control system and control method thereof
CN105469476A (en) Housing security management method and system
CN108221270B (en) Shared washing machine control method, device and system based on embedded computer
KR20160116849A (en) Patrol and vehicles management system
KR20130040408A (en) Elevator security system with multiple authentication methods and smartphone
CN114299641B (en) Door control noninductive unlocking method and system
KR101236581B1 (en) Security service system with a ??self-authentication registration function
CN110288727A (en) The intelligent system on duty in unmanned laboratory
CN109920087A (en) Intelligent access control system
CN111640222A (en) Safety cabinet device, unlocking method and unlocking system
CN111210546A (en) Access control management method and system realized by intelligent lock
CN111915765A (en) Personnel safety monitoring method and system based on intelligent lock and sensor linkage
CN113763603B (en) Information processing apparatus, information processing method, computer-readable storage medium, and portable terminal
KR101063751B1 (en) Biometrics-based Passenger Identification and Information Transmission System
KR20160023516A (en) Cloud security identifying system
JP2002298263A (en) Portable terminal and collating system using it

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant